You are on page 1of 8

Lesson 9: Working with Workgroups and Domains Multiple Choice 1.

Which of the following is the process of verifying the identity of the person operating the computer? a) Authorization b) Authentication c) Auditing d) Rights manipulation Answer: b Difficulty: Easy Section Reference: Working with Users and Groups Explanation: Authentication is the process of verifying that the identity of the person operating the computer is the same as the user account the person is employing to gain access. Typically, to be authenticated, the human user must supply some piece of information associated with the user account such as a password, demonstrate some personal characteristic such as a fingerprint, or prove access to an identifying possession (such as using a smart card). 2. Which of the following is the process of granting an authenticated user a specific degree of access to specific computer or data resources? a) Authorization b) Authentication c) Auditing d) Rights manipulation Answer: a Difficulty: Easy Section Reference: Working with Users and Groups Explanation: Authorization is the process of granting an authenticated user a specific degree of access to specific computer or data resources. In Windows, a user account provides access to permissions that grant the human user access to files and folders, printers, and other resources. 3. Which of the following enables users to perform specific operating system tasks such as shut down the system or perform backups? a) Authorization b) Authentication c) Auditing d) User rights Answer: d Difficulty: Medium Section Reference: Working with Users and Groups Explanation: User rights are specific operating system tasks, such as Shut Down the System or Allow Log On Through Terminal Services, which are performed only by certain users designated by a system administrator. User rights are managed from the local security policies or group policies. 4. Which of the following enables the user to manage, configure, or perform certain tasks on an object? a) Authorization b) Authentication c) Permissions

Page 1 of 8

d) User rights Answer: c Difficulty: Easy Section Reference: Working with Users and Groups Explanation: As the authenticated user begins working with the operating system, the authorization process occurs whenever the user attempts to access certain resources or perform specific tasks. All of the Windows permission systems, including NTFS, share, registry, and Active Directory permissions, are user based. The access control list (ACL) for each permission-protected resource contains a list of users and the degree of access each user is granted to the resource. 5. Which of the following is an entity that represents a collection of users or computers? a) Tasks b) Groups c) Rights manipulators d) Inheritable objects Answer: b Difficulty: Easy Section Reference: Working with Users and Groups Explanation: A group is another type of entity that Windows uses to represent a collection of users. System administrators can create groups for any reason and with any name and then use them just as they would a user account. All members of the group automatically inherit any permissions or user rights that an administrator assigns to a group. 6. What is a collection of computers that are all peers? a) Objects b) Workgroups c) Domains d) Groups Answer: b Difficulty: Easy Section Reference: Introducing the Workgroup Explanation: A workgroup is a collection of computers that are all peers. A peer network is one in which every computer can function as both a server by sharing its resources with other computers and function as a client by accessing the shared resources on other computers. On a workgroup network, each computer has its own set of users and groups that it uses to control access to its own resources. 7. What is a collection of computers that all utilize a central directory service for authentication and authorization and is usually associated with Active Directory? a) Homegroups b) Workgroups c) Domains d) Groups Answer: c Difficulty: Easy Section Reference: Introducing the Domain Explanation: A domain is a collection of computers that all utilize a central directory service for authentication and authorization. A directory service is a collection of logical objects that represent

Page 2 of 8

various types of network resources, such as computers, applications, users, and groups. Each object consists of attributes that contain information about the object. 8. What program do you use to manage fully all local users and group accounts on a computer running Windows 7? a) User Accounts Control Panel b) Computer Management console c) Registry Editor d) System Configuration Answer: b Difficulty: Medium Section Reference: Using the Local Users and Groups Snap-In Explanation: The User Accounts control panel provides only partial access to local user accounts and no access to groups other than the Users and Administrators groups. The Local Users and Groups snap-in, on the other hand, provides full access to all the local user and group accounts on the computer. By default, the Local Users and Groups snap-in is part of the Computer Management console. However, you can also load the snap-in by itself, or create your own MMC console with any combination of snap-ins. 9. Which of the following is a series of folders associated with a specific user account that contains personal documents and personal settings? a) Hardware profile b) Personal hive c) User template d) User profile Answer: d Difficulty: Medium Section Reference: Understanding User Profiles Explanation: A user profile is a series of folders, associated with a specific user account, that contains personal documents, user-specific registry settings, Internet favorites, and other personalized information everything that provides a users familiar working environment. On a Windows 7 computer, user profiles are stored in the Users folder and then in subfolders named for the user accounts. 10. Which type of user profile is automatically created when a user logs on the computer for the first time and is stored on the computers local hard drive? a) Local user profile b) Roaming user profile c) Mandatory user profile d) Template user profile Answer: a Difficulty: Easy Section Reference: Recognizing User Profile Types Explanation: Local user profiles are profiles that Windows 7 automatically creates when each user logs on at the computer for the first time. The local user profile is stored on the computers local hard disk, specifically in the Users folder. 11. Which type of user profile is stored on a shared server drive, which makes it accessible from anywhere on the network? a) Local user profile

Page 3 of 8

b) Roaming user profile c) Mandatory user profile d) Template user profile Answer: b Difficulty: Medium Section Reference: Recognizing User Profile Types Explanation: A roaming user profile is a copy of a local user profile that is stored on a shared server drive, which makes it accessible from anywhere on the network. So no matter which computer you log on to, you get the same user settings. 12. Which type of user profile is stored on a network share but does not allow changes to be saved? a) Local user profile b) Roaming user profile c) Mandatory user profile d) Template user profile Answer: c Difficulty: Medium Section Reference: Recognizing User Profile Types Explanation: A mandatory user profile is a roaming profile that users cannot change. Administrators use mandatory user profiles to enforce particular desktop settings for individuals or for a group of users. A fourth variation, called a super-mandatory profile, requires the user to access the server-based profile or the logon fails. 13. What technology helps prevent software from making changes to your system without your knowledge? a) USB b) ACL c) UAC d) ACE Answer: c Difficulty: Medium Section Reference: Understanding User Account Control Explanation: Microsoft uses User Account Control (UAC) to protect your machine from unauthorized changes by keeping all Windows 7 users from accessing the system using administrative privileges unless those privileges are required to perform the task at hand. 14. When accessing an object, which of the following lists each user that can access the object and what each user can do with the object? a) ACL b) ACE c) UAC d) User rights Answer: a Difficulty: Medium Section Reference: Working with Users and Groups Explanation: The access control list (ACL) for each permission-protected resource contains a list of users and the degree of access each user is granted to the resource.

Page 4 of 8

15. Which group includes all members of the Authenticated Users group plus the Guest user account? a) Everyone b) Anonymous Logon c) Interactive d) IUSR Answer: a Difficulty: Easy Section Reference: Introducing Special Identities Explanation: Just as it sounds, Everyone includes everyone, specifically all members of the Authenticated Users special identity plus the Guest user account. 16. Which program or component includes User Accounts? a) Control Panel b) Computer Management console c) Registry Editor d) System Configuration Answer: a Difficulty: Easy Section Reference: Creating and Managing Local Users and Groups Explanation: Microsoft designed the User Accounts control panel for relatively inexperienced end users; it provides a simplified interface with extremely limited access to user accounts. With this interface, it is possible to create local user accounts and modify their basic attributes, but you cannot create groups or manage group memberships (except for the Administrators group). 17. Which program is an MMC snap-in? a) Control Panel b) Local Users and Groups c) Registry Editor d) System Configuration Answer: b Difficulty: Medium Section Reference: Creating and Managing Local Users and Groups Explanation: Microsoft includes the Local Users and Groups MMC snap-in as part of the Computer Management console; it provides full access to local users and groups and all their attributes. Designed more for the technical specialist or system administrator, this interface is not difficult to use, but it does provide access to controls that beginning users generally do not need. 18. Which tab would you use to configure a login script or a mapping to a home drive and folder when using the Local Users and Groups snap-in? a) General b) Standard c) Mappings d) Profile Answer: d Difficulty: Medium Section Reference: Managing Local Users

Page 5 of 8

Explanation: The Profile tab enables you to specify the profile path, login script, and the location of your home folder (local or UNC). 19. Which of the following do you have to create the same user account for on each computer that a user needs to access? a) NFS b) Workgroups c) Domains d) Groups Answer: b Difficulty: Easy Section Reference: Introducing the Workgroup Explanation: On a workgroup network, each computer has its own set of users and groups that it uses to control access to its own resources. For example, if you want to use one computer to access resources on all four of the other computers on a five-node workgroup network, you must have a user account on each of those four computers. As you connect to each computer, you are authenticated and authorized by each one. If effect, you are logging on to each computer individually. 20. What is a collection of logical objects that represent various types of network resources such as computers, users, and groups? a) Directory service b) Naming service c) Indexing service d) Controlling service Answer: a Difficulty: Easy Section Reference: Introducing the Domain Explanation: A directory service is a collection of logical objects that represent various types of network resources, such as computers, applications, users, and groups. Each object consists of attributes that contain information about the object. It is also used to find and locate objects. 21. What is Microsofts directory service called? a) NDS b) AD c) NFS d) DNS Answer: b Difficulty: Easy Section Reference: Introducing the Domain Explanation: To create a domain, you must have at least one Windows server with the Active Directory Domain Services (AD DS) directory service installed. A domain is a collection of computers that all utilize a central directory service for authentication and authorization. A directory service is a collection of logical objects that represent various types of network resources, such as computers, applications, users, and groups. Each object consists of attributes that contain information about the object. 22. Which account is designed for users that require only temporary access to the computer and is disabled by default? a) Temp

Page 6 of 8

b) Guest c) Visitor d) Admin Answer: b Difficulty: Easy Section Reference: Introducing Built-In Local Users Explanation: The Guest account is designed for users that require only temporary access to the computer and do not need high levels of access. The Guest account is disabled by default and is only a member of the Guests group, which provides it with only the most rudimentary access to the system. 23. What do you call it when you are loading an application, and you get a credential prompt that makes the rest of the screen dull and unclickable? a) Desktop approval mode b) Desktop upgrade c) Secure desktop d) Elevated desktop Answer: c Difficulty: Medium Section Reference: Using Secure Desktop Explanation: By default, whenever Windows 7 displays an elevation prompt or a credential prompt, it does so using the secure desktop. The secure desktop is an alternative to the interactive user desktop that Windows normally displays. When Windows 7 generates an elevation or a credential prompt, it switches to the secure desktop, which suppresses the operation of all other desktop controls and permitting only Windows processes to interact with the prompt. The object of this is to prevent malware from automating a response to the elevation or credential prompt and bypassing the human reply. Fill in the Blank 24.______________ provides authentication in Active Directory. Answer: Domain controller Difficulty: Medium Section Reference: Introducing the Domain Explanation: To create a domain, you must have at least one Windows server with the Active Directory Domain Services (AD DS) directory service installed. This server is called a domain controller. Each of the computers then joins the domain and is represented by a computer object. 25. _________ is an entry in the ACL. Answer: ACE Difficulty: Hard Section Reference: Introducing Special Identities Explanation: When the access control list (ACL) for a system resource contains a special identity in one of its access control entries (ACE), the system substitutes the users that conform to the special identity at the moment the ACL is processed. 26. The __________________ group enables you to back up any files on the hard drive. Answer: Backup Operator

Page 7 of 8

Difficulty: Medium Section Reference: Introducing Built-In Local Groups Explanation: The Backup Operators have user rights enabling them to override permissions for the sole purpose of backing up and restoring files, folders, and other operating system elements. Short Answer 27. Which two accounts are automatically created but disabled when you install a clean copy of Windows 7? Answer: Administrator and Guest Difficulty: Medium Section Reference: Introducing Built-In Local Users Explanation: During a typical Windows 7 installation, the Setup program creates an Administrator account and makes it a member of the Administrators group, giving it complete access to all areas of the operating system. However, the Setup program leaves the account in a disabled state and does not assign it a password. The Guest account is designed for users that require only temporary access to the computer and do not need high levels of access. The Guest account is disabled, by default, and is only a member of the Guests group, which provides it with only the most rudimentary access to the system. 28. When you create a standard user, which group is the user added to? Answer: Users Difficulty: Hard Section Reference: Creating a New User Account Explanation: What the User Accounts control panel refers to as an account type is actually a group membership. Selecting the Standard user option adds the user account to the local Users group, whereas selecting the Administrator option adds the account to the Administrators group. Essay 29. Explain what UAC is and how it works to protect your system. Answer: UAC is short for User Account Control. The standard user account is meant to be used for dayto-day tasks. However, if you need to perform certain system tasks that require administrative access, you are prompted for administrative credentials or logins. If you visit a Web site or install an application and the software tries to make these system changes, you are prompted to login with an account that has administrative permissions. At this point, you should ask yourself if the Web site or software is supposed to be making such changes. If it should, you should enter the credentials for the administrative account. If it should not, you should not log in with the credentials and stop the installation or close the Web site. Difficulty: Hard Section Reference: Understanding User Account Control

Page 8 of 8

You might also like